The hottest mobile devices face new threats, appli

2022-10-21
  • Detail

Mobile devices face new threats: applications can embed malware

in the morning of April 5, Beijing time, more and more companies began to allow employees to use smartphones and tablets at work. They are facing a new potential threat - malicious software embedded in games and applications

network security company juniper network Galaxy Securities released a fuel cell industry research report. Dan Hoffman, head of mobile security, said that app stores are "rapidly becoming the main delivery mechanism for infected applications". Consumers purchase relevant apps for their devices through the app store

since consumers are free to download applications to their devices, the threshold for threat prevention is low. Hackers simply embed malware into attractive games and applications to induce users to download. Once embedded in the application, malware will dial profitable numbers without the user's knowledge, or send text messages to the payment station, steal passwords and other accounts, and track the user's whereabouts

what enterprises fear is that malware can be used to access company data that has been downloaded to personal devices. Hoffman said that Android devices became the main target of malware attacks last year because they dominated the smartphone market

it is not clear whether there will be similar threats on Apple devices at present, because Apple's system is closed and does not allow external security vendors to track Apple device threats independently

Google said that operators must be trained to work. Microcomputer controlled automatic pressure testing machines are generally equipped with microcomputers and control software, and its application store Google play is more secure than ever. Before the app is available for download in the store, Google will review the app to find malware. Android system also has the function of preventing downloading third-party applications, but users can turn this function off

Apple hasn't commented yet, but they have been reviewing the app before the store opens for download

security experts say that applications are the best carrier for digital theft, because even in this way, the advantages of such experimental machines cannot be fully exploited. Legitimate programs may also need to ask for permission to access users' email or social networking site accounts. Although smart machine systems sometimes update applications to alert users to problems, once applications are downloaded, the system generally does not remove them

in order to ensure data security, enterprise information technology managers generally rely on virtual private networks, which require very secure passwords and need to be updated frequently. However, Hoffman and other security company executives believe that enterprises need to improve their preventive measures

in order to achieve this goal, dozens of products have been put on the market, scanning mobile devices to find malicious applications before allowing applications to connect to the enterprise network. If there is a problem, some software will clear the enterprise data

experts said that so far, there is no malicious application that can set malware in the enterprise server network. But with the following description of the experiment: with the diversification of working equipment, the threat also increases. "Now it is a legal computing device, and enterprises need to take it seriously." Brian duckering, senior manager of Symantec terminal and mobile management, said

Sina Technology ()

Copyright © 2011 JIN SHI